IKM -- An identity based key management scheme for heterogeneous sensor networks

被引:11
作者
Boujelben M. [1 ]
Youssef H. [2 ]
Mzid R. [1 ]
Abid M. [1 ]
机构
[1] Institut Supérieur d'Informatique et des Technologies de Communication, Hammam Sousse
关键词
Identity based cryptography; Key management; Sensor networks;
D O I
10.4304/jcm.6.2.185-197
中图分类号
学科分类号
摘要
Wireless sensor networks applications are growing and so are their security needs. However, due to severe memory, computing and communication limitations, wireless sensor networks security presents tremendous challenges. Central to any security service, key management is a fundamental cryptographic primitive to provide other security operations. In this paper, we propose IKM, an identity based key management scheme designed for heterogeneous sensor networks. This scheme provides a high level of security as it is based on a variant of public key cryptography named pairing identity based cryptography. The IKM scheme supports the establishment of two types of keys, pairwise key to enable point to point communication between pairs of neighbouring nodes, and cluster key to make in-network processing feasible in each cluster of nodes. IKM also supports the addition of new nodes and re-keying mechanism. A security analysis is presented to prove the scheme resilience against several types of attacks especially the node compromise attack. We also perform an overhead analysis of the proposed scheme in terms of storage, communication, and computation requirements. To demonstrate the feasibility of this scheme, we present implementation and performance evaluation of the proposed scheme on Crossbow TelosB motes running TinyOS. The results indicate that it can be deployed efficiently in resource-constrained sensor networks that need a high level of security. © 2011 ACADEMY PUBLISHER.
引用
收藏
页码:185 / 197
页数:12
相关论文
共 33 条
[1]  
Eschenauer L., Gligor V.D., A key management scheme for distributed sensor networks, Proceedings of the 9th ACM Conference on Computer and Communication Security, pp. 41-47, (2002)
[2]  
Zhu S., Setia S., Jajodia S., LEAP: Efficient security mechanisms for large-scale distributed sensor networks, ACM CCS 2003, pp. 62-72, (2003)
[3]  
Gupta P., Kumar P., The capacity of wireless networks, IEEE Transactions on Information Theory IT 2000, 2, pp. 388-404, (2000)
[4]  
Du X., Xiao Y., Guizani M., Chen H.H., An Effective Key Management Scheme for Heterogeneous Sensor Networks, AdHoc Networks, Elsevier, 5, 1, pp. 24-34, (2007)
[5]  
Adler R., Flanigan M., Huang J., Kling R., Kushalnagar N., Nachman L., Wan C.-Y., Yarvis M., Intel mote 2: An advanced platform for demanding sensor network applications, SenSys '05, (2005)
[6]  
Bohge M., Trappe W., An authentication framework for hierarchical ad hoc sensor networks, Proc. of 2003 ACM workshop on Wireless Security (WiSE '03), (2003)
[7]  
Rivest R.L., Shamir A., Adleman L.M., A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, 21, 2, pp. 120-126, (1978)
[8]  
Koblitz N., Elliptic curve cryptosystems, Mathematics of Computation 48, pp. 203-209, (1987)
[9]  
Gura N., Patel A., Wander A., Eberle H., Shantz S.C., Comparing elliptic curve cryptography and RSA on 8-bit CPUs, Proceedings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems, (2004)
[10]  
Du W., Deng J., Han Y.S., Chen S., Varshney P.K., Proceedings of IEEE INFOCOM 2004